CVE-2021-43702
https://notcve.org/view.php?id=CVE-2021-43702
ASUS RT-A88U 3.0.0.4.386_45898 is vulnerable to Cross Site Scripting (XSS). The ASUS router admin panel does not sanitize the WiFI logs correctly, if an attacker was able to change the SSID of the router with a custom payload, they could achieve stored XSS on the device. ASUS RT-A88U versión 3.0.0.4.386_45898 es vulnerable a un ataque de tipo Cross Site Scripting (XSS). El panel de administración del enrutador ASUS no desinfecta los registros de WiFI correctamente, si un atacante pudiera cambiar el SSID del enrutador con una carga útil personalizada, podría obtener XSS almacenado en el dispositivo • https://www.asus.com/uk/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AC88U https://www.kroll.com/en/insights/publications/cyber/cve-2021-43702-from-discovery-to-patch • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2017-6548 – ASUSWRT RT-AC53 (3.0.0.4.380.6038) - Remote Code Execution
https://notcve.org/view.php?id=CVE-2017-6548
Buffer overflows in networkmap on ASUS RT-N56U, RT-N66U, RT-AC66U, RT-N66R, RT-AC66R, RT-AC68U, RT-AC68R, RT-N66W, RT-AC66W, RT-AC87R, RT-AC87U, RT-AC51U, RT-AC68P, RT-N11P, RT-N12+, RT-N12E B1, RT-AC3200, RT-AC53U, RT-AC1750, RT-AC1900P, RT-N300, and RT-AC750 routers with firmware before 3.0.0.4.380.7378; RT-AC68W routers with firmware before 3.0.0.4.380.7266; and RT-N600, RT-N12+ B1, RT-N11P B1, RT-N12VP B1, RT-N12E C1, RT-N300 B1, and RT-N12+ Pro routers with firmware before 3.0.0.4.380.9488; and Asuswrt-Merlin firmware before 380.65_2 allow remote attackers to execute arbitrary code on the router via a long host or port in crafted multicast messages. Desbordamiento de búfer en networkmap en routers ASUS RT-N56U, RT-N66U, RT-AC66U, RT-N66R, RT-AC66R, RT-AC68U, RT-AC68R, RT-N66W, RT-AC66W, RT-AC87R, RT-AC87U, RT-AC51U, RT-AC68P, RT-N11P, RT-N12+, RT-N12E B1, RT-AC3200, RT-AC53U, RT-AC1750, RT-AC1900P, RT-N300 y RT-AC750 con firmware en versiones anteriores a 3.0.0.4.380.7378; routers RT-AC68W con firmware en versiones anteriores a 3.0.0.4.380.7266 y routers RT-N600, RT-N12+ B1, RT-N11P B1, RT-N12VP B1, RT-N12E C1, RT-N300 B1 y RT-N12+ Pro con firmware en versiones anteriores a 3.0.0.4.380.9488 y Asuswrt-Merlin firmware en versiones anteriores a 380.65_2 permite a atacantes remotos ejecutar código arbitrario en el router a través de un host o puerto largo en mensajes de multidifusión manipulados. • https://www.exploit-db.com/exploits/41573 http://www.securityfocus.com/bid/96938 https://asuswrt.lostrealm.ca/changelog https://bierbaumer.net/security/asuswrt/#remote-code-execution • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2017-6549 – ASUSWRT RT-AC53 (3.0.0.4.380.6038) - Session Stealing
https://notcve.org/view.php?id=CVE-2017-6549
Session hijack vulnerability in httpd on ASUS RT-N56U, RT-N66U, RT-AC66U, RT-N66R, RT-AC66R, RT-AC68U, RT-AC68R, RT-N66W, RT-AC66W, RT-AC87R, RT-AC87U, RT-AC51U, RT-AC68P, RT-N11P, RT-N12+, RT-N12E B1, RT-AC3200, RT-AC53U, RT-AC1750, RT-AC1900P, RT-N300, and RT-AC750 routers with firmware before 3.0.0.4.380.7378; RT-AC68W routers with firmware before 3.0.0.4.380.7266; and RT-N600, RT-N12+ B1, RT-N11P B1, RT-N12VP B1, RT-N12E C1, RT-N300 B1, and RT-N12+ Pro routers with firmware before 3.0.0.4.380.9488; and Asuswrt-Merlin firmware before 380.65_2 allows remote attackers to steal any active admin session by sending cgi_logout and asusrouter-Windows-IFTTT-1.0 in certain HTTP headers. Vulnerabilidad de secuestro de sesión en httpd en routers ASUS RT-N56U, RT-N66U, RT-AC66U, RT-N66R, RT-AC66R, RT-AC68U, RT-AC68R, RT-N66W, RT-AC66W, RT-AC87R, RT-AC87U, RT-AC51U, RT-AC68P, RT-N11P, RT-N12+, RT-N12E B1, RT-AC3200, RT-AC53U, RT-AC1750, RT-AC1900P, RT-N300 y RT-AC750 con firmware en versiones anteriores a 3.0.0.4.380.7378; routers RT-AC68W con firmware en versiones anteriores a 3.0.0.4.380.7266 y routers RT-N600, RT-N12+ B1, RT-N11P B1, RT-N12VP B1, RT-N12E C1, RT-N300 B1 y RT-N12+ Pro con firmware en versiones anteriores a 3.0.0.4.380.9488 y Asuswrt-Merlin firmware en versiones anteriores a 380.65_2 permite a atacantes remotos robar cualquier sesión de administrador activa enviando cgi_logout y asusrouter-Windows-IFTTT-1.0 en ciertos encabezados HTTP. • https://www.exploit-db.com/exploits/41572 http://www.securityfocus.com/bid/96938 https://asuswrt.lostrealm.ca/changelog https://bierbaumer.net/security/asuswrt/#session-stealing • CWE-287: Improper Authentication •
CVE-2017-6547 – ASUSWRT RT-AC53 (3.0.0.4.380.6038) - Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2017-6547
Cross-site scripting (XSS) vulnerability in httpd on ASUS RT-N56U, RT-N66U, RT-AC66U, RT-N66R, RT-AC66R, RT-AC68U, RT-AC68R, RT-N66W, RT-AC66W, RT-AC87R, RT-AC87U, RT-AC51U, RT-AC68P, RT-N11P, RT-N12+, RT-N12E B1, RT-AC3200, RT-AC53U, RT-AC1750, RT-AC1900P, RT-N300, and RT-AC750 routers with firmware before 3.0.0.4.380.7378; RT-AC68W routers with firmware before 3.0.0.4.380.7266; and RT-N600, RT-N12+ B1, RT-N11P B1, RT-N12VP B1, RT-N12E C1, RT-N300 B1, and RT-N12+ Pro routers with firmware before 3.0.0.4.380.9488 allows remote attackers to inject arbitrary JavaScript by requesting filenames longer than 50 characters. Vulnerabilidad XSS en httpd en routers ASUS RT-N56U, RT-N66U, RT-AC66U, RT-N66R, RT-AC66R, RT-AC68U, RT-AC68R, RT-N66W, RT-AC66W, RT-AC87R, RT-AC87U, RT-AC51U, RT-AC68P, RT-N11P, RT-N12+, RT-N12E B1, RT-AC3200, RT-AC53U, RT-AC1750, RT-AC1900P, RT-N300 y RT-AC750 con firmware en versiones anteriores a 3.0.0.4.380.7378; routers RT-AC68W con firmware en versiones anteriores a 3.0.0.4.380.7266 y routers RT-N600, RT-N12+ B1, RT-N11P B1, RT-N12VP B1, RT-N12E C1, RT-N300 B1 y RT-N12+ Pro con firmware en versiones anteriores a 3.0.0.4.380.9488 permiten a atacantes remotos inyectar JavaScript arbitrario solicitando nombres de archivo de más de 50 caracteres. • https://www.exploit-db.com/exploits/41571 http://www.securityfocus.com/bid/96938 https://bierbaumer.net/security/asuswrt/#cross-site-scripting-xss • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •